1.
Widodo T, Muhsina EA, Sugiantoro B. Honeypot Log Analysis as a Network Security Support. IJID [Internet]. 2013 May 26 [cited 2025 Jan. 23];2(1):8-12. Available from: https://ejournal.uin-suka.ac.id/saintek/ijid/article/view/02102